• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • PowerTech Updates Compliance Manager

    October 9, 2007 Alex Woodie

    System i shops looking for a powerful, System i-based security compliance reporting product may want to check out the new release of Compliance Monitor unveiled by PowerTech Group last week. With the capability to process bigger chunks of security log data from more systems into plain English results that are easier to understand, Version 2.0 promises to be the nontechnical security auditor’s best friend.

    Debuting as “ComplianceMonitor” in October 2005, Compliance Monitor is designed to help System i shops satisfy the security audit components of regulations like PCI, SOX, and HIPAA. By interrogating the i5/OS QAUDJRN security log and several other sources of security data via end-point agents, mapping that data into more general COBIT and ISO-17799 terms, and then generating attractive-looking compliance reports in PDF and Excel formats from a Windows-based console, Compliance Monitor allows even nontechnical personnel to accurately assess the strength or weakness of production System i servers.

    With version 2, PowerTech has tried to reduce the performance impact that large amounts of security data can have on the system. The new version compresses the audit data when it’s sitting on the “consolidator” tier, an i5/OS-based component of the product that receives log data from the other System i servers equipped with end-point agents. PowerTech says it is able to compress data stored in IBM‘s proprietary QAUDJRN format by up to 95 percent.

    By reducing the DASD impact, it now becomes feasible to keep larger amounts of audit data online for the reporting component of Compliance Monitor. This can have a big impact on the quality of the reports generated, especially when comparing present security “snapshots” to older snapshots taken by the software.

    Additional new features cited by PowerTech include integration with other PowerTech products, including PowerTech Network Security and Authority Broker, which will provide another source of security data besides the native i5/OS sources; and streamlined report reviews, which allow users to view reports only when there are exceptions to their security policy.

    Many System i shops unknowingly put their data at risk when they are pressured by business forces to open their back-end systems to other areas of their company and partners, says John Earl, vice president and chief technology officer with PowerTech. “Compliance Monitor 2.0 helps organizations begin to close this gap by providing a streamlined tool for identifying and reporting security issues relating to the System i vis-a-vis regulatory and industry compliance rules,” he says.

    Compliance Monitor 2.0 is available now. The end-point and consolidator components of Compliance Monitor each require OS/400 V5R2 or higher. The graphical console requires Windows 2000, XP, or Vista. PowerTech is also giving a discount on Compliance Monitor to users of its older compliance reporting product, the 5250-based Security Audit. For more information, visit www.powertech.com.

    RELATED STORIES

    PowerTech Tools Build Trust By Decreasing Authority

    PowerTech Unveils New Password Utility

    PowerTech Picks New President and CEO

    PowerTech Debuts ComplianceMonitor, Studies Security Practices



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Raz-Lee Security

    iSecurity Multi Factor Authentication (MFA) helps organizations meet compliance standards and improve the existing security environment on IBM i. It requires a user to verify his identity with two or more credentials.

    Key Features:

    • iSecurity provides Multi Factor Authentication as part of the user’s initial program
    • Works with every Authenticator App available in the Market.

    Contact us at https://www.razlee.com/isecurity-multi-factor-authentication/

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    SafeData:  The iSeries HA Solution that’s Guaranteed
    COMMON:  Join us at the annual 2008 conference, March 30 - April 3, in Nashville, Tennessee
    NowWhatJobs.net:  NowWhatJobs.net is the resource for job transitions after age 40

    IT Jungle Store Top Book Picks

    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket Developers' Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    iSeries Express Web Implementer's Guide: List Price, $59.00
    Getting Started with WebSphere Development Studio for iSeries: List Price, $79.95
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    WebFacing Application Design and Development Guide: List Price, $55.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    The All-Everything Machine: List Price, $29.95
    Chip Wars: List Price, $29.95

    What Are Else Are Employees Up To? Shopping Online During Con Calls Controlling System i Shutdown Activities Using an Intelligent Power-Handling Program, Part I

    Leave a Reply Cancel reply

Volume 7, Number 38 -- October 9, 2007
THIS ISSUE SPONSORED BY:

BOSaNOVA
Aldon
nuBridges
Computer Measurement Group
RJS Software Systems

Table of Contents

  • ACOM Updates EZ Content Manager
  • looksoftware’s Modernization Suite Resembling a Full IDE
  • Pat Townsend Normalizes i5/OS Log Data for Security Analyses
  • Linoma Boosts Surveyor/400’s SQL Functionality
  • PowerTech Updates Compliance Manager
  • IBM Comments on iSeries Access and Windows Vista
  • Update on Virtualization Manager’s i5/OS LPAR Capabilities
  • Raz-Lee Supports SSL in i5/OS Firewall
  • Inventive Designers Launches DTM for iSeries Version 3
  • Optio Software Saves Manufacturer from the Paper Chase

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • IBM i Has a Future ‘If Kept Up To Date,’ IDC Says
  • When You Need Us, We Are Ready To Do Grunt Work
  • Generative AI: Coming to an ERP Near You
  • Four Hundred Monitor, March 22
  • IBM i PTF Guide, Volume 25, Number 12
  • Unattended IBM i Operations Continue Upward Climb
  • VS Code Is The Full Stack IDE For IBM i
  • Domino Runs on IBM i 7.5, But HCL Still Working on Power10
  • Four Hundred Monitor, March 6
  • IBM i PTF Guide, Volume 25, Number 11

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2023 IT Jungle